From the Fall 2014 Issue

INTERNATIONAL COOPERATION IN COMBATING CYBERTHREATS: THE U.S. – ISRAEL EXAMPLE

Author(s):

Ira E. Hoffman, Esq., Of Counsel, Butzel Long

In recent years, two significant developments — (1) the sabotage of centrifuges and Programmable Logic Controllers at Iran’s secret Natanz nuclear fuel-enrichment facility by the Stuxnet worm, and (2) the accelerating growth in the tremendous investment by American information technology (“IT”) giants in Israel — have come to epitomize the close cooperation between the U.S. … Read more

From the Fall 2014 Issue

Is Healthcare Ready for BYOD?

Author(s):

Kris Martel, EVP of Operations, Chief Information Security Officer, Emagine IT

Information Security is a growing concern across all Health and Human Services (HSS) agencies as well as hospitals, doctor offices and any organization dealing with Personal Identifiable Information (PII) or Protected Health Information (PHI). Specifically, the proliferation of mobile devices and their potential for storing and transferring sensitive information requires a new approach to how … Read more

From the Fall 2014 Issue

Intel and the Internet of Things

Author(s):

Daren Dunkel, Manager, Enterprise Sales, Amazon Web Services

The Internet of Things (IoT) will represent a tectonic shift in the way computing is done.  A megatrend if you will, that impacts high technology and society in general.  This is the consensus of two industry veterans with a combined 28 years of technology experience. IoT was recently defined as “a concept in which electronic … Read more

From the Summer 2014 Issue

Stalking Prey: An RF Hacker’s Perspective

Author(s):

Rick Mellendick, Chief Security Officer, Process Improvement Achievers, LLC

Nearly everyone has an RF signature, and it is becoming as common as your fingerprint. This signature is the culmination of device and device usage such as: Your cell phone’s frequency Names of the networks you connect to with yourdevices Bluetooth devices and the connections to andfrom them Your device or devices (e.g., laptop, phone, … Read more

From the Summer 2014 Issue

Cybersecurity in the Supply Chain

Author(s):

Taylor Wilkerson, Program Manager, Supply Chain Management Program, LMI

For most of us, cybersecurity means network and data protection. We think of intrusion detection, firewalls, secure network design, secure and trained workforce, social engineering, and other security activities. Essentially, we view cybersecurity as the tools and activities that keep our networks and the data that they handle secured. But what if one of the … Read more

From the Summer 2014 Issue

Implementing Continuous Monitoring to Combat the Nation’s Cyber Threat

Author(s):

Matt Brown, Vice President, Homeland Security and Cyber Solutions Knowledge Consulting Group (KCG)

Cyber attacks on federal government systems are increasing in volume, vigor and complexity. In fiscal 2012 alone, there were 48,562 cybersecurity incidents at federal agencies reported to the U.S. Computer Emergency Readiness Team (US-CERT), a division of the Department of Homeland Security’s National Cybersecurity and Communications Integration Center (NCCIC). That’s a 782 percent increase over … Read more

From the Spring 2014 Issue

Eliminating Threat Vectors in Cyber Attacks

Author(s):

Steve Stratton, Vice President, Business Development, COPT

Question: Can infrastructure play a positive role in your Cybersecurity program? Most often we think of infrastructure in a negative way, something we have to protect. It is the mess that we have to attempt to control through policy, procedures, technology and training. It takes a lot of different systems, network and data security components … Read more

From the Spring 2014 Issue

Reduce Risk, Train Your Workforce

Author(s):

Michael Volk, Cybersecurity Specialist, PSA Insurance & Financial Services

The threat landscape in the cyber domain has changed. A secure perimeter comprised of traditional network security devices, technologies and mechanisms is necessary but it is no longer sufficient to defend against the threats that exist in the current environment. The proliferation of Advanced Persistent Threats (APTs) executed by sophisticated adversaries has changed the cybersecurity … Read more

From the Winter 2014 Issue

CYBER INSURANCE

Author(s):

Gordon M. Mumpower, Jr., CPCU, MBA, President, Commercial Insurance Managers Inc.

Security systems are installed to prevent hackers from unauthorized access into computer networks. Hacking is prevalent by individuals who are employed within or outside companies, groups from around the world, teenage amateurs, sophisticated techies, and your spouse late at night. You purchase the best technology from the smartest and innovative vendors to protect your company … Read more